2015
DOI: 10.1016/j.jisa.2015.07.001
|View full text |Cite
|
Sign up to set email alerts
|

Fair secret reconstruction in (t, n) secret sharing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
10
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 16 publications
(10 citation statements)
references
References 25 publications
0
10
0
Order By: Relevance
“…Moreover, our protocol could accurately check the malicious behavior of the participants or the server and does not require multiple interactions between the participants and the server, which applies to cloud computing environments and mobile networks. Maleka et al [29] Harn et al [30] Pilaram and Eghlidos [10] Traverso et al […”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…Moreover, our protocol could accurately check the malicious behavior of the participants or the server and does not require multiple interactions between the participants and the server, which applies to cloud computing environments and mobile networks. Maleka et al [29] Harn et al [30] Pilaram and Eghlidos [10] Traverso et al […”
Section: Resultsmentioning
confidence: 99%
“…But this scheme requires a trusted third party. In order to achieve desire of fairness, Harn et al [30] proposed a fair secret sharing scheme, but the scheme requires multiple protocol rounds and cannot be effectively applied to devices with poor computing capabilities.…”
Section: Performance Analysismentioning
confidence: 99%
“…The scheme in reference [11] cannot completely resist asynchronous attacks and synchronous collusion attacks. The schemes in references [14,15] only consider the fairness of secret reconstruction in an asynchronous environment but do not consider CAS and NCAS. And the schemes do not meet complete fairness, and both need a hash function to ensure security.…”
Section: Scheme Comparison and Performance Analysismentioning
confidence: 99%
“…From the perspective of scheme complexity, the scheme reconfiguration protocol in this section requires θðvÞ a round of secret reconfiguration protocols to achieve fairness, which is the same as the fair secret sharing scheme proposed in references [11,[14][15][16]19]. From the perspective of each round of reconfiguration protocol, each participant in this scheme receives k elements on GFðpÞ from D, and additional 2ðn − 1Þ elements, FðID i , yÞ mod p containing t elements for generating the session key, there are k + t + 2ðn − 1Þ in total.…”
Section: Scheme Comparison and Performance Analysismentioning
confidence: 99%
See 1 more Smart Citation